Tech Debates

Tech Debates news, trend analysis and opinion

We find industry experts to argue opposing views of a hot topic. Read through both points of view,
vote for who you think got it most right, and weigh in with your own opinion, whether it is in agreement
with one of the pros or introduces an angle you think they missed.

One of the critical decisions facing companies embarking on big data projects is which database to use, and often that decision swings between SQL and NoSQL. SQL has the impressive track record, the large installed base, but NoSQL is...

Shadow IT is defined as IT systems and/or services brought into the organization without IT approval. While it is often perceived as sneaky and potentially dangerous, some contend that Shadow IT can lead to innovation and increased...

Is it time to virtualize and centralize the resources so users can access “the desktop” from anywhere using anything, or does the venerable old workhorse still have a place in the modern organization?
The Experts
Joe...

Some contend that BYOD has taken off because employees want experiences that IT can't deliver, and the BYOD success is a sign that IT's influence is eroding. Poppycock, say others. Critical new technologies are constantly emerging...

If you are going with public cloud services, there is a certain appeal to centralizing your apps with as few suppliers as possible to minimize the management overhead. But given the recent outages with Amazon and other leading...

The BYOD craze is sweeping organizations everywhere, but questions abound, everything from security and compliance to cost control/management.While BYOD lets IT piggyback on user enthusiasm for new productivity tools, is the risk...

Organizations are gaining confidence in cloud computing, although questions still swirl around everything from basic security and compliance controls to issues regarding supplier viability, ROI and, given the prominent outages of...

Training is often cited as a critical component of the security puzzle because no security system is foolproof and users need to know the critical role they play. But others argue that too many security professionals rely on training...

There are many things that are easier to do in the cloud, but is security one of them? Proponents argue that basing security tools in the cloud provide all the benefits of any cloud-based resource, including low cost of entry,...

Age vs. experience? The argument dates back years and will likely never be resolved, but in the world of high tech, where firms are clamoring for IT skills and yet there are displaced workers looking for jobs, the debate rages on. ...

The explosion of smart mobile devices brings with it unparalleled enterprise risk. It is hard enough to secure corporate resources when they are in IT’s glass house, or at least on the company grounds. What to do when suddenly the...

Fabric is one of the hottest topics in the data center, and with good reason. Virtualization of data center resources, an explosion of server-to-server traffic, and ever increasing application demands are stressing traditional...

The list of benefits for the Bring Your Own Device movement is long, but so is the list of associated risks. Is the time right to connect employee gadgets to the company network, or should we be more circumspect?
The Experts...

Apple iOS and Google Android have emerged as the two most popular operating system platforms for mobile devices, both smartphones and tablets. They are also both backed by rich development and application ecosystems. There are,...

Proponents say government funding of broadband build out will help the US stay relevant in this online world, and ultimately benefit small business and translate into jobs. Critics say the private sector is doing just fine, thank...

Personal computing as we know it is changing as hordes of workers arrive with their favorite new tech tools and demand access to corporate resources. We ask two companies likely to play key roles in the flexible new world of end...

In the cat and mouse game that is enterprise security, it is hard to determine who has the upper hand, so we put the question to two experts. Give their arguments a read, vote on the position you most agree with and add your...

The age old question about whether to go with best-of-breed products or integrated solutions is particularly salient when it comes to intrusion-prevention systems. Security is an area where you need the best possible point...

When companies suffer a security breach today they face that core dilemma: Tell the world and hope the honesty helps others, or keep it under wraps to avoid tarnishing the brand and duck possible lawsuits? One thing is clear from...